{"id":13242,"date":"2025-04-08T08:23:08","date_gmt":"2025-04-08T05:23:08","guid":{"rendered":"https:\/\/www.kaspersky.com.tr\/blog\/?p=13242"},"modified":"2025-04-08T08:23:08","modified_gmt":"2025-04-08T05:23:08","slug":"protecting-from-tracking-via-findmy-airtag","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.tr\/blog\/protecting-from-tracking-via-findmy-airtag\/13242\/","title":{"rendered":"Bul a\u011f\u0131 arac\u0131l\u0131\u011f\u0131yla herhangi biri nas\u0131l izlenir?"},"content":{"rendered":"<p>AirTag\u2019ler, anahtar\u0131n\u0131 unutanlardan <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-protect-from-stalking-with-airtag\/10529\/\" target=\"_blank\" rel=\"noopener\">k\u0131skan\u00e7 e\u015fler<\/a> ve <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/how-to-find-airtag-and-other-location-trackers-on-android-2024\/12638\/\" target=\"_blank\" rel=\"noopener\">araba h\u0131rs\u0131zlar\u0131<\/a> gibi k\u00f6t\u00fc niyetli ki\u015filere kadar herkes taraf\u0131ndan kullan\u0131lan pop\u00fcler bir izleme cihaz\u0131d\u0131r. AirTag\u2019leri casusluk i\u00e7in kullanmak basittir: Hedefin \u00fczerine gizlice bir etiket yerle\u015ftirilir ve <strong>Apple Bul<\/strong> arac\u0131l\u0131\u011f\u0131yla hareketlerin rahat\u00e7a izlenebilmesi sa\u011flan\u0131r. <a href=\"https:\/\/www.kaspersky.com.tr\/mobile-security?icid=tr_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____c8090141bf3f79f6\" target=\"_blank\" rel=\"noopener\">Android i\u00e7in \u00fcr\u00fcnlerimize<\/a>\u00a0<a href=\"https:\/\/www.kaspersky.com.tr\/blog\/airtag-and-stalkerware-protection-on-android\/13007\/\" target=\"_blank\" rel=\"noopener\">AirTag tabanl\u0131 izlemeye kar\u015f\u0131 koruma<\/a> bile ekledik.<\/p>\n<p>Ancak g\u00fcvenlik ara\u015ft\u0131rmac\u0131lar\u0131 taraf\u0131ndan yap\u0131lan yeni bir <a href=\"https:\/\/cs.gmu.edu\/~zeng\/papers\/2025-security-nrootgag.pdf\" target=\"_blank\" rel=\"nofollow noopener\">\u00e7al\u0131\u015fma<\/a>, \u015fa\u015f\u0131rt\u0131c\u0131 bir \u015fekilde uzaktan izlemenin bir AirTag sat\u0131n almaya veya fiziksel olarak hedefin yak\u0131n\u0131nda olmaya bile ba\u011fl\u0131 olmad\u0131\u011f\u0131n\u0131 ortaya koydu. Birinin Windows, Android veya Linux cihaz\u0131na (bilgisayar veya telefon gibi) \u00f6zel bir k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m yerle\u015ftirmeyi ba\u015far\u0131rsan\u0131z, cihaz\u0131n Bluetooth\u2019unu kullanarak yak\u0131ndaki Apple cihazlar\u0131n\u0131n AirTag\u2019den geldi\u011fini d\u00fc\u015f\u00fcnece\u011fi bir sinyal g\u00f6nderebilir. Yani k\u0131sacas\u0131 vir\u00fcs bula\u015fm\u0131\u015f telefon veya bilgisayar, Apple ayg\u0131tlar\u0131 i\u00e7in, bir milyardan fazla Apple telefon ve tabletin bulundu\u011fu <strong>Bul<\/strong> a\u011f\u0131 arac\u0131l\u0131\u011f\u0131yla izlenebilen b\u00fcy\u00fck boy bir AirTag haline gelir.<\/p>\n<h2>Sald\u0131r\u0131n\u0131n anatomisi<\/h2>\n<p>Sald\u0131r\u0131, <strong>Bul<\/strong> teknolojisinin iki \u00f6zelli\u011finden faydalan\u0131r.<\/p>\n<p>\u0130lk olarak, bu a\u011f u\u00e7tan uca \u015fifreleme kullan\u0131r, b\u00f6ylece kat\u0131l\u0131mc\u0131lar kimin sinyallerini ilettiklerini bilmezler. Bilgi al\u0131\u015fveri\u015fi i\u00e7in AirTag ve sahibinin telefonu bir \u00e7ift kriptografik anahtar kullan\u0131r. Kay\u0131p bir AirTag, Bluetooth arac\u0131l\u0131\u011f\u0131yla \u201c\u00e7a\u011fr\u0131 i\u015faretlerini\u201d yay\u0131nlad\u0131\u011f\u0131nda, <strong>Bul<\/strong> a\u011f\u0131 \u201cdedekt\u00f6rleri\u201d (yani, Bluetooth ve internet eri\u015fimi olan herhangi bir Apple ayg\u0131t\u0131, kime ait olursa olsun) AirTag\u2019in co\u011frafi konum verilerini Apple sunucular\u0131na iletir. Veriler kay\u0131p AirTag\u2019in genel anahtar\u0131 ile \u015fifrelenir.<\/p>\n<p>Ard\u0131ndan, herhangi bir cihaz sunucudan \u015fifrelenmi\u015f konum verilerini isteyebilir ancak \u015fifreli oldu\u011fu i\u00e7in Apple, sinyalin kime ait oldu\u011funu ya da hangi cihaz\u0131n istedi\u011fini bilmez. Buradaki en \u00f6nemli nokta, bir ki\u015finin yaln\u0131zca ilgili \u00f6zel anahtara sahip olarak verilerin \u015fifresini \u00e7\u00f6zebilmesi ve hem AirTag\u2019in kime ait oldu\u011funu hem de tam konumunu bulabilmesidir. Dolay\u0131s\u0131yla, bu veriler yaln\u0131zca bu AirTag ile e\u015fle\u015ftirilmi\u015f ak\u0131ll\u0131 telefonun sahibinin i\u015fine yarar.<\/p>\n<p><strong>Bul<\/strong>\u2018un bir ba\u015fka \u00f6zelli\u011fi de dedekt\u00f6rlerin konum sinyalinin ger\u00e7ekten bir Apple ayg\u0131t\u0131ndan gelip gelmedi\u011fini do\u011frulamamas\u0131d\u0131r. Bluetooth D\u00fc\u015f\u00fck Enerji (BLE) protokol\u00fcn\u00fc destekleyen t\u00fcm cihazlar bunu yay\u0131nlayabilir.<\/p>\n<p>Bu \u00f6zelliklerden faydalanmak i\u00e7in ara\u015ft\u0131rmac\u0131lar a\u015fa\u011f\u0131daki y\u00f6ntemi geli\u015ftirdiler:<\/p>\n<ol>\n<li>Android, Windows veya Linux \u00e7al\u0131\u015ft\u0131ran bir bilgisayara, telefona veya ba\u015fka bir cihaza k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m y\u00fckleyip Bluetooth adapt\u00f6r adresini kontrol ederler.<\/li>\n<li>Sald\u0131rganlar\u0131n sunucusu bu bilgileri al\u0131r ve cihaz\u0131n Bluetooth adresine \u00f6zel ve Apple\u2019\u0131n <strong>Bul<\/strong> teknolojisiyle uyumlu bir \u00e7ift \u015fifreleme anahtar\u0131 olu\u015fturmak i\u00e7in g\u00fc\u00e7l\u00fc ekran kartlar\u0131 kullan\u0131r.<\/li>\n<li>A\u00e7\u0131k anahtar vir\u00fcsl\u00fc cihaza geri g\u00f6nderilir ve k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m daha sonra AirTag sinyallerini taklit eden ve bu anahtar\u0131 i\u00e7eren bir Bluetooth mesaj\u0131 iletmeye ba\u015flar.<\/li>\n<li>Yak\u0131ndaki internete ba\u011fl\u0131 herhangi bir Apple ayg\u0131t\u0131 Bluetooth mesaj\u0131n\u0131 al\u0131r ve <strong>Bul<\/strong> sunucular\u0131na iletir.<\/li>\n<li>Sald\u0131rganlar\u0131n sunucusu, <strong>Bul<\/strong>\u2018dan vir\u00fcsl\u00fc cihaz\u0131n konumunu istemek ve verilerin \u015fifresini \u00e7\u00f6zmek i\u00e7in \u00f6zel anahtar\u0131 kullan\u0131r.<\/li>\n<\/ol>\n<h2>\u0130zleme ne kadar iyi \u00e7al\u0131\u015f\u0131yor?<\/h2>\n<p>Yak\u0131nlarda ne kadar \u00e7ok Apple cihaz\u0131 varsa ve kurban\u0131n hareketi ne kadar yava\u015fsa, konum izlemenin do\u011frulu\u011fu ve h\u0131z\u0131 o kadar iyi olur. Evler veya ofisler gibi tipik \u015fehir ortamlar\u0131nda, konum genellikle alt\u0131 ila yedi dakika i\u00e7inde ve yakla\u015f\u0131k \u00fc\u00e7 metrelik bir do\u011frulukla tespit edilir. U\u00e7akta olmak gibi ekstrem durumlarda bile, internet eri\u015fimi art\u0131k u\u00e7u\u015flarda yayg\u0131n olarak bulundu\u011fundan, izleme yine de ger\u00e7ekle\u015febilir. Ara\u015ft\u0131rmac\u0131lar, 90 dakikal\u0131k u\u00e7u\u015f boyunca 17 co\u011frafi konum noktas\u0131 elde ederek u\u00e7a\u011f\u0131n u\u00e7u\u015f rotas\u0131n\u0131 olduk\u00e7a do\u011fru bir \u015fekilde yeniden olu\u015fturdular.<\/p>\n<p>Do\u011fal olarak, sald\u0131r\u0131n\u0131n ba\u015far\u0131s\u0131 kurbana k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m bula\u015ft\u0131r\u0131l\u0131p bula\u015ft\u0131r\u0131lamayaca\u011f\u0131na ba\u011fl\u0131d\u0131r ve ayr\u0131nt\u0131lar platforma ba\u011fl\u0131 olarak biraz farkl\u0131d\u0131r. Linux cihazlarda sald\u0131r\u0131, \u00f6zel Bluetooth uygulamas\u0131 nedeniyle yaln\u0131zca kurban\u0131n ayg\u0131t\u0131na bula\u015fmay\u0131 gerektirir. Buna kar\u015f\u0131l\u0131k, Android ve Windows Bluetooth adres rastgelele\u015ftirmesi kullan\u0131r, yani sald\u0131rgan\u0131n yak\u0131ndaki iki Bluetooth cihaz\u0131na bula\u015fmas\u0131 gerekir; biri izleme hedefi olarak (AirTag\u2019i taklit eden) ve di\u011feri adapt\u00f6r adresini elde etmek i\u00e7in.<\/p>\n<p>K\u00f6t\u00fc niyetli uygulaman\u0131n Bluetooth eri\u015fimine ihtiyac\u0131 vard\u0131r, ancak bunu elde etmek zor de\u011fildir. Medya oynat\u0131c\u0131lar, dosya payla\u015f\u0131m ara\u00e7lar\u0131 ve hatta \u00f6deme uygulamalar\u0131 gibi bir\u00e7ok yayg\u0131n uygulama kategorisinin bunu talep etmek i\u00e7in genellikle me\u015fru nedenleri vard\u0131r. Bu t\u00fcr bir sald\u0131r\u0131 i\u00e7in ikna edici ve i\u015flevsel bir yem uygulamas\u0131 yarat\u0131lmas\u0131, hatta <a href=\"https:\/\/www.kaspersky.com.tr\/blog\/ios-android-ocr-stealer-sparkcat\/13153\/\" target=\"_blank\" rel=\"noopener\">var olan bir uygulaman\u0131n Truva at\u0131na d\u00f6n\u00fc\u015ft\u00fcr\u00fclmesi<\/a> muhtemeldir. Sald\u0131r\u0131 y\u00f6netici izinleri ya da k\u00f6k eri\u015fimi gerektirmez.<\/p>\n<p>Daha da \u00f6nemlisi, sadece telefonlar ve bilgisayarlardan bahsetmiyoruz: Android ve Linux bir\u00e7o\u011funun ortak i\u015fletim sistemleri oldu\u011fundan, sald\u0131r\u0131 ak\u0131ll\u0131 TV\u2019ler, sanal ger\u00e7eklik g\u00f6zl\u00fckleri ve di\u011fer ev aletleri de dahil olmak \u00fczere bir dizi cihazda etkilidir.<\/p>\n<p>Sald\u0131r\u0131n\u0131n bir di\u011fer \u00f6nemli k\u0131sm\u0131 da sunucudaki kriptografik anahtarlar\u0131n hesaplanmas\u0131n\u0131 i\u00e7ermesi. Modern ekran kartlar\u0131na sahip donan\u0131mlar\u0131n kiralanmas\u0131n\u0131 gerektiren bu i\u015flemin karma\u015f\u0131kl\u0131\u011f\u0131 nedeniyle, tek bir kurban i\u00e7in anahtar \u00fcretmenin maliyetinin yakla\u015f\u0131k 2,2 dolar oldu\u011fu tahmin edilmektedir. Bu nedenle, \u00f6rne\u011fin bir al\u0131\u015fveri\u015f merkezindeki ziyaret\u00e7ileri hedef alan kitlesel izleme senaryolar\u0131n\u0131 olas\u0131 bulmuyoruz. Bununla birlikte, bu fiyat noktas\u0131ndaki hedefli sald\u0131r\u0131lar, doland\u0131r\u0131c\u0131lar veya merakl\u0131 i\u015f arkada\u015flar\u0131 ve e\u015fler de dahil olmak \u00fczere hemen hemen herkes taraf\u0131ndan eri\u015filebilir.<\/p>\n<h2>Apple\u2019\u0131n yan\u0131t\u0131<\/h2>\n<p>\u015eirket, Aral\u0131k 2024\u2019te iOS 18.2, visionOS 2.2, iPadOS 17.7.3 (eski cihazlar i\u00e7in) ve 18.2 (yeni cihazlar i\u00e7in), watchOS 11.2, tvOS 18.2, macOS Ventura 13.7.2, macOS Sonoma 14.7.2 ve macOS Sequoia 15.2\u2019de <strong>Bul<\/strong> a\u011f\u0131 g\u00fcvenlik a\u00e7\u0131\u011f\u0131 i\u00e7in yama yay\u0131nlad\u0131. Ne yaz\u0131k ki, Apple\u2019da s\u0131kl\u0131kla oldu\u011fu gibi, g\u00fcncellemelerin ayr\u0131nt\u0131lar\u0131 a\u00e7\u0131klanmad\u0131. Ara\u015ft\u0131rmac\u0131lar, t\u00fcm Apple kullan\u0131c\u0131lar\u0131 en az\u0131ndan yukar\u0131daki s\u00fcr\u00fcmlere g\u00fcncelleme yapana kadar bu izleme y\u00f6nteminin teknik olarak m\u00fcmk\u00fcn olmaya devam edece\u011fini, ancak izlenen bir cihaz\u0131n konumunu daha az say\u0131da cihaz\u0131n bildirebilece\u011fini <a href=\"https:\/\/nroottag.github.io\/\" target=\"_blank\" rel=\"nofollow noopener\">vurguluyor<\/a>. Apple yamas\u0131n\u0131n ba\u015fka bir m\u00fchendislik hilesi ile a\u015f\u0131lmas\u0131 da imkans\u0131z de\u011fil.<\/p>\n<h2>Kendinizi sald\u0131r\u0131dan nas\u0131l korursunuz?<\/h2>\n<ul>\n<li>Cihaz\u0131n\u0131zda bu se\u00e7enek varsa, kullanmad\u0131\u011f\u0131n\u0131z zamanlarda Bluetooth\u2019u kapat\u0131n.<\/li>\n<li>Uygulamalar\u0131 y\u00fcklerken yaln\u0131zca g\u00fcvenilir kaynaklara ba\u011fl\u0131 kal\u0131n. Uygulaman\u0131n uzun s\u00fcredir piyasada oldu\u011funu, \u00e7ok say\u0131da indirme ald\u0131\u011f\u0131n\u0131 ve en son s\u00fcr\u00fcm\u00fcnde y\u00fcksek bir derecelendirmeye sahip oldu\u011funu do\u011frulay\u0131n.<\/li>\n<li>Bluetooth ve konum eri\u015fimini yaln\u0131zca bu \u00f6zelliklere ihtiyac\u0131n\u0131z oldu\u011fundan emin oldu\u011funuz uygulamalarda a\u00e7\u0131n.<\/li>\n<li>Cihaz\u0131n\u0131z\u0131 d\u00fczenli olarak g\u00fcncelleyin; hem i\u015fletim sistemini hem de ana uygulamalar\u0131.<\/li>\n<li>T\u00fcm cihazlar\u0131n\u0131zda kapsaml\u0131 k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131m korumas\u0131n\u0131n etkin oldu\u011fundan emin olun. Biz <a href=\"https:\/\/www.kaspersky.com.tr\/premium?icid=tr_bb2023-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">Kaspersky Premium<\/a>\u00a0\u00f6neriyoruz.<\/li>\n<\/ul>\n<blockquote><p>Bu olduk\u00e7a al\u0131\u015f\u0131lmad\u0131k ve hen\u00fcz g\u00f6r\u00fclmemi\u015f izleme y\u00f6nteminin yan\u0131 s\u0131ra, konumunuzun ve faaliyetlerinizin izlenebilece\u011fi \u00e7ok say\u0131da ba\u015fka yol da vard\u0131r. Sizi g\u00f6zetlemek i\u00e7in hangi y\u00f6ntemler kullan\u0131l\u0131yor? Ayr\u0131nt\u0131lar i\u00e7in a\u015fa\u011f\u0131daki yaz\u0131lar\u0131m\u0131za g\u00f6z atabilirsiniz:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/disable-mobile-app-ad-tracking\/13196\/\" target=\"_blank\" rel=\"noopener\">Ak\u0131ll\u0131 telefonlar hakk\u0131n\u0131zda nas\u0131l dosya olu\u015fturur?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/webcam-stalking\/52733\/\" target=\"_blank\" rel=\"noopener nofollow\">Web kameras\u0131yla gizlice izleme: Ger\u00e7ek mi kurgu mu?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/airtag-and-stalkerware-protection-on-android\/13007\/\" target=\"_blank\" rel=\"noopener\">Bluetooth ve benzeri ara\u00e7larla takip edilmekten kendinizi nas\u0131l korursunuz?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/tracking-and-hacking-kia-cars-via-internet\/12916\/\" target=\"_blank\" rel=\"noopener\">Milyonlarca Kia otomobil nas\u0131l takip edilebilir?<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/running-apps-privacy-settings-part1-common\/52403\/\" target=\"_blank\" rel=\"noopener nofollow\">Verileriniz i\u00e7in ko\u015fun: Ko\u015fu uygulamalar\u0131nda gizlilik ayarlar\u0131<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/car-manufacturers-silently-sell-user-telematics-data\/12388\/\" target=\"_blank\" rel=\"noopener\">Ge\u00e7en yaz nas\u0131l araba kulland\u0131\u011f\u0131n\u0131 biliyorum<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com.tr\/blog\/tag\/cografi-konum\/\" target=\"_blank\" rel=\"noopener\">\u2026 ve di\u011fer yaz\u0131lar<\/a>.<\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>Apple&#8217;\u0131n Bul a\u011f\u0131, di\u011fer sat\u0131c\u0131lar\u0131n Android, Windows ve Linux cihazlar\u0131n\u0131 uzaktan izlemek i\u00e7in kullan\u0131labilir.<\/p>\n","protected":false},"author":2722,"featured_media":13243,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1351],"tags":[2535,105,14,2108,500,22,708,750,672,2643,537],"class_list":{"0":"post-13242","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-airtag","9":"tag-android","10":"tag-apple","11":"tag-cografi-konum","12":"tag-gizlilik","13":"tag-google","14":"tag-gozetim","15":"tag-ios","16":"tag-izleme","17":"tag-konum","18":"tag-tehditler"},"hreflang":[{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/protecting-from-tracking-via-findmy-airtag\/13242\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/protecting-from-tracking-via-findmy-airtag\/28718\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/23957\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/12348\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/30692\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/protecting-from-tracking-via-findmy-airtag\/28835\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/28017\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/protecting-from-tracking-via-findmy-airtag\/30862\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/protecting-from-tracking-via-findmy-airtag\/29567\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/protecting-from-tracking-via-findmy-airtag\/39310\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/protecting-from-tracking-via-findmy-airtag\/53245\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/protecting-from-tracking-via-findmy-airtag\/22688\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/protecting-from-tracking-via-findmy-airtag\/32048\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/protecting-from-tracking-via-findmy-airtag\/28988\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/protecting-from-tracking-via-findmy-airtag\/34782\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/protecting-from-tracking-via-findmy-airtag\/34413\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.tr\/blog\/tag\/airtag\/","name":"AirTag"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13242","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/comments?post=13242"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13242\/revisions"}],"predecessor-version":[{"id":13245,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/posts\/13242\/revisions\/13245"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media\/13243"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/media?parent=13242"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/categories?post=13242"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.tr\/blog\/wp-json\/wp\/v2\/tags?post=13242"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}